Biped robots have gained much attention for decades. A variety of researches has been conducted to make them able to assist or even substitute for humans in performing special tasks. In addition, studying biped robots is important in order to understand the human locomotion and to develop and improve control strategies for prosthetic and orthotic limbs. Some challenges encountered in the design of biped robots are: (1) biped robots have unstable structures due to the passive joint located at the unilateral foot-ground contact. (2) They have different configuration when switching from walking phase to another. During the singlesupport phase, the robot is under-actuated, while turning into an over-actuated system during the double-support phase. (3) Biped robots have many degrees of freedom (DOFs). (4) Biped robots interact with different unknown environments. Therefore, this work attempts to investigate and resolve different issues encountered in dynamics, walking pattern generators and control of biped robots; the details as follows: • Dynamics Two walking patterns have been modeled using two well-known formulations: Lagrangian and the modified recursive Newton-Euler (N-E) formulations. The first walking pattern moves with 6 DOFs during the single support phase (SSP) changing its configuration with 7 DOFs during the double support phase (DSP) (the stance foot will move directly during the DSP). Whereas the other walking pattern has 6 DOFs during all walking phases (the SSP and the two sub-phases of the DSP); the stance foot will be fixed during the first sub-phase of the DSP. These two walking pattern are different in configuration and number of phases during the DSP. To resolve the problem of over-actuation, a linear transition function is proposed to ensure smooth transition for the biped from the SSP to the DSP and vice versa. If we assume ideal dynamic response, this strategy can resolve the discontinuity in input control torque and ground reaction forces. • Walking pattern generators Two methods have been used to generate walking patterns of biped mechanism which are (1) optimal control theory and (2) center of gravity (COG)-based model. Computational optimal control has been performed to investigate the effects of some imposed constraints on biped locomotion, such as enforcing swing foot to move level to the ground, hip motion with constant height etc. finite difference approach has been used to transcribe infinite dimensional optimal control problem into finite dimensional suboptimal control problem. Then parameter optimization has been used to get suboptimal trajectory of the biped with the imposing different constraints. In general, any artificially imposed constraint to biped locomotion can lead to increase in value of input control torques. On the other hand, suboptimal trajectory of biped robot during complete gait cycle had been accomplished with different cases such that continuous dynamic response occurs. Enforcing the biped locomotion to move with linear transition of zero-moment point (ZMP) during the DSP can lead to more energy consumption. Using the simple COG-based model, a comparative study has been conducted to generate continuous motion for COG of the biped; all these methods depend on linear pendulum model. It has been shown all these methods are equivalent. On the other hand, the effect of foot configuration has been investigated. Foot rotation can improve biped configuration at heel strike by controlling foot angle. In addition, foot motion with impact can give some freedom and uniform biped configuration compared with motion without impact. To compensate for the deviation of ZMP trajectory due to approximate model of the COG, a novel strategy has been proposed to satisfy kinematic and dynamic constraints, as well as singularity condition. A stable motion has been obtained for the target walking patterns. • Low-level control Two control schemes have been proposed based on dynamics formulations which are conventional adaptive control based on local approximation technique and Lagrangian formulation, and virtual decomposition control (VDC) based on local approximation technique and recursive N-E formulation. In the first approach (conventional control), a new representation of dynamic matrices has been coined which is computationally efficient than other representation (sparse-base representation, Kronecker product etc.). Controller structures for the SSP and the DSP have been designed in details. Since adaptive control assumes no prior knowledge of estimated weighting matrices; therefore, zero input control torques could be result in at the beginning of each phase. Consequently, discontinuous dynamic response could result. The VDC is an efficient tool for complex robotic system such as biped robot. Therefore each subsystem (link, joint) has been controlled using adaptive approximation–based VDC. A novel optimization technique has been used to deal with continuous dynamic response; however, using zero initial weighting matrices for estimation dynamic matrices and vectors could result in zero input control at beginning of each walking phases.
Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreBackground The appropriate disposal of medication is a well-recognized issue that has convened growing recognition in several contexts. Insufficient awareness relating to appropriate methods for the disposal of unneeded medicine may result in notable consequences. The current research was conducted among the public in Iraq with the aim of examining their knowledge, attitude, and practices regarding the proper disposal of unused and expired medicines. Methods The present study used an observational cross-sectional design that was community-based. The data were obtained from using an online questionnaire. The study sample included people of diverse genders, regardless of their race or occupational status. The study mandated that all pa
... Show MoreRefrigerant R134a has been widely utilized in automotive air conditioning systems (AACSs); R134a has a high global warming potential (GWP) of 1430 despite having zero ozone depletion potential (ODP). Coming refrigeration systems must include refrigerants with low GWP and zero ODP. The aim of this experimental study is to evaluate the thermal performance of an (AAC) with different values of compressor speeds, i.e., (1000, 1700, and 2400 rpm) and two thermal loads, i.e., (500 and 1000 Watt) with the absence and presence of liquid suction heat exchanger (LSHX) using R134a. The results showed that adding LSHX enhanced the COP cycle by 7.18%, 10.7%, and 3.09% for the first, second, and third speed, respectively, at 500 Watt, while the en
... Show MoreThis study included estimation of glutathione (GSH) and Malondialdehyde (MDA) levels in the serum of diabetic patients type II who are treated with a polyherbs mixture (Nigella sativa, Trigonella foenum-graeum, Cyperus rotundus and Teucrium polium) for three months of treatments. Seventy samples of diabetic patients Type II male and females with age about (35-60) years were taken including 44 samples for group one (24 male, 20 female) who used herbs accompanied with chemical treatment (drugs) and 26 samples for the second group (13male and 13 female) who used herbs only. These groups were compared with 60 samples obtained from healthy persons (29 male, 31 female) at the same age of patients as a control group. Effect of age and treatment fo
... Show Moreيسعى البحث إلى الاهتمام بإحدى الوظائف المهمة في إدارة الموارد البشرية وهي تقويم الأداء التي تواجه مجموعة من الانتقادات والآراء السلبية، اذ ظهر في الأّونة الأخيرة أنموذج جديد يمكن إن يتجاوز تلك السلبيات وهو أنموذج التغذية العكسية المتعدد المصادر درجة .وقد حاول الباحثان توظيف هذا المفهوم في اثنتين من المنظمات العامة العراقية هما (دائرة كهرباء الوسط) التابعة لوزارة الكهرباء
و (دائرة الماء والمجاري) ال
Background and Aim: Canine parvovirus 2 (CPV-2) is a highly contagious virus that infects wild and domestic canines. Despite the use of a routine vaccination protocol, it is endemic in Iraq. The genetic drift of CPV-2 is a major issue worldwide because it abrogates virus control. In Iraq, there is a knowledge gap regarding the genetic sequences of asymptomatic and symptomatic CPV-2 cases. Therefore, this study aimed to perform a genetic analysis of viral capsid protein 1 (VP1) and viral capsid protein 2 (VP2), two major capsid-encoding genes, to demonstrate the possible role of certain mutations in triggering infection. Materials and Methods: Symptomatic and asymptomatic cases (n = 100/each) were tested by a polymerase chain reacti
... Show MoreBackground: Diabetes mellitus is a metabolic disorder affecting people worldwide, which require constant monitoring of their glucose levels. Commonly employed procedures include collection of blood or urine samples causing discomfort to the patients. Necessity arises to find alternative non invasive technique is required to monitor glucose levels. Saliva is one of most abundant secretions in the human body and its collection is easy, noninvasive and painless technique. Objective: The aim of this study was to determine the efficacy of saliva as a diagnostic tool by study the correlation between blood and salivary glucose levels and glycosylated hemoglobin (HbA1c%) in diabetes and non diabetes, and the comparison of salivary glucose level
... Show More